search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%2522Rub&253%25390 Llorente%2222
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(3)
Keywords
100%
Intruder detection with tcpdump
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
expressions # tcpdump -
n
-I eth1 host 10.10.
253
.34 and host 10.10.33.10# tcpdump -
n
-I eht1 src net 10.10.
253
.0/24 and dst net 10.10.33.0/24 or 192.5.5.241# tcpdump -
n
-I eth1 src net 10
93%
Security without firewalls
31.10.2025
Home
»
Archive
»
2012
»
Issue 12: NAS S...
»
software, Postfix [
2
]. The story goes that the talented Venema needed to keep track of attacks on workstations at a university and wrote a piece of software capable of limiting port access by rules
90%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
julia> limulus limulus limulus limulus
n
2
n
0
n
2
n
0 To get a better feel for parallel computation, I can run the example from the Julia documentation [
9
]. First, see how it works on one node